Search

Monero (XMR)

Monero (XMR) is an open-source cryptocurrency based on CryptoNote protocol that focuses on privacy, fungibility and decentralization. Fungibility is a simple property of money such that there are no differences between two amounts of the same value.

Trezor protocol is in line with Monero cold-wallet signing protocol. This protocol was already present in Monero so it was the best approach to integrate Trezor. Trezor implementation works with Bulletproofs. If the number of outputs is 2 (vast majority of transactions), Trezor does all of the Bulletproofs calculations. For more than 2 outputs, the calculation is offloaded to host (in the wallet) and then Trezor device performs a check of the calculation. There is no Trezor limit for number of inputs/outputs so these are the same as in Monero (16 for both).

5. If you used your Trezor device with Monero client before choose "Restore a wallet from device. Use this if you used your hardware wallet before." (Use restore height 1692975). Otherwise, choose "Create a new wallet from device".

7. Give your wallet a password. In this step, you're required to create a password to access your wallet. Please remember that this password cannot be recovered and you will be using it every time during signing in or sending transactions via Monero GUI. In case you forget the password, you can recover your wallet using your Trezor device.

8. If you are using your node, choose "Start a node automatically in background (recommended)". If you want to use remote node choose "Connect to a remote node".

9. You are all set up! You can now send your moneroj using Monero GUI wallet. Please check your Trezor device during the syncing, as you might be prompted to proceed with the refresh.

ImportantIf you are recovering a Monero wallet with a Trezor device which has already been used with Monero, you need to use the hw_key_images_sync command after wallet sync to prevent double spending, which the monerod deamon would reject.

4. After creating your wallet, you can try to receive and send moneroj with Trezor device.

In cryptography, a ring signature is a type of digital signature that can be performed by any member of a group of users that each have keys. Therefore, a message signed with a ring signature is endorsed by someone in a particular group of people. One of the security properties of a ring signature is that it should be computationally infeasible to determine which of the group members' keys was used to produce the signature.

Since 10 January 2017, Monero uses Ring CT technology which not only hides the amount being sent, but also hides the funds from the public blockchain, only letting the recipient and the sender know how much was sent.

Stealth addresses are an important part of Monero inherent privacy. They allow and require the sender to create random one-time addresses for every transaction on behalf of the recipient. The recipient can publish just one address, yet have all of his/her incoming payments go to unique addresses on the blockchain, where they cannot be linked back to either the recipient's published address or any other addresses of the transaction. By using stealth addresses, only the sender and receiver can determine where a payment was sent.

Monero does not have a cap in total supply like Bitcoin, which means that Monero block rewards will never drop to zero. Block rewards will gradually drop until tail emission commences at the end of May 2022. At this point, rewards will be fixed at 0.6 XMR per block.

Monero confidential transactions hide the amounts involved. To ensure that inputs and outputs balance properly in a way that can be verified by anyone, monero uses commitments that have useful algebraic properties. It is also needed to ensure that each amount is a positive value that will not risk an overflow, and this is where range proofs come in. A range proof allows anyone to verify that a commitment represents an amount within a specified range, without revealing anything else about its value. Range proofs scaled linearly in size with the number of outputs and the number of bits in the range meaning they made up the bulk of a transaction size. Furthermore, this means that a transaction with multiple outputs needs multiple separate range proofs.

Bulletproofs are a new non-interactive zero-knowledge proof protocol with very short proofs and without a trusted setup. The size of a bulletproof increases only logarithmically with both the size of the range and the number of outputs. This technology brought space savings, better verification times, and lower fees.